CVE-2025-12100: CWE-276 Incorrect Default Permissions in MongoDB BI Connector ODBC driver
Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.This issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6.
AI Analysis
Technical Summary
CVE-2025-12100 identifies a critical security vulnerability in the MongoDB BI Connector ODBC driver, specifically versions 1.0.0 through 1.4.6. The root cause is incorrect default permissions (CWE-276), which means that the driver’s files or configuration are set with overly permissive access rights upon installation. This misconfiguration enables users with limited privileges on the host system to escalate their privileges, potentially gaining administrative or root-level access. The vulnerability affects confidentiality, integrity, and availability because an attacker could access sensitive data, modify or corrupt data, or disrupt database connectivity and analytics operations. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), partial attack traceability (AT:P), requiring low privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Exploitation requires some initial access but no user interaction, making it a significant risk in environments where the driver is deployed on shared or multi-user systems. No public exploits are reported yet, but the high severity score and the nature of the vulnerability suggest that exploitation could lead to full system compromise. The MongoDB BI Connector is used to enable business intelligence tools to query MongoDB data via ODBC, making it a critical component in data analytics pipelines. The vulnerability thus poses a risk to organizations relying on MongoDB for data warehousing and analytics, especially where the driver is installed on systems accessible by multiple users.
Potential Impact
For European organizations, the impact of CVE-2025-12100 can be severe. Privilege escalation vulnerabilities allow attackers to bypass security controls, potentially gaining administrative access to systems hosting the MongoDB BI Connector ODBC driver. This can lead to unauthorized access to sensitive business intelligence data, manipulation or deletion of critical analytics datasets, and disruption of data-driven decision-making processes. Industries such as finance, healthcare, manufacturing, and government agencies that rely heavily on data analytics are particularly vulnerable. The breach of confidentiality could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity violations could corrupt analytics results, affecting operational decisions. Availability impacts could disrupt business continuity if the driver or associated services are compromised. Given the local attack vector, the threat is heightened in environments where multiple users share access or where attackers have gained initial footholds through other means. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency.
Mitigation Recommendations
1. Immediately audit all systems running MongoDB BI Connector ODBC driver versions 1.0.0 through 1.4.6 to identify installations. 2. Apply patches or upgrade to a fixed version as soon as MongoDB releases an update addressing this vulnerability. 3. Until patches are available, manually review and tighten file system permissions on the driver’s installation directories and configuration files to restrict access to trusted administrators only. 4. Implement strict access controls and user privilege management on systems hosting the driver to minimize the number of users with local access. 5. Monitor system logs and audit trails for unusual privilege escalation attempts or access patterns related to the driver. 6. Employ endpoint detection and response (EDR) tools to detect suspicious activities indicative of exploitation attempts. 7. Educate system administrators and security teams about the vulnerability and the importance of least privilege principles. 8. Consider isolating the BI Connector driver environment or running it within hardened containers or virtual machines to reduce attack surface. 9. Review and update incident response plans to include scenarios involving privilege escalation through this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-12100: CWE-276 Incorrect Default Permissions in MongoDB BI Connector ODBC driver
Description
Incorrect Default Permissions vulnerability in MongoDB BI Connector ODBC driver allows Privilege Escalation.This issue affects BI Connector ODBC driver: from 1.0.0 through 1.4.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-12100 identifies a critical security vulnerability in the MongoDB BI Connector ODBC driver, specifically versions 1.0.0 through 1.4.6. The root cause is incorrect default permissions (CWE-276), which means that the driver’s files or configuration are set with overly permissive access rights upon installation. This misconfiguration enables users with limited privileges on the host system to escalate their privileges, potentially gaining administrative or root-level access. The vulnerability affects confidentiality, integrity, and availability because an attacker could access sensitive data, modify or corrupt data, or disrupt database connectivity and analytics operations. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), partial attack traceability (AT:P), requiring low privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H, VI:H, VA:H). Exploitation requires some initial access but no user interaction, making it a significant risk in environments where the driver is deployed on shared or multi-user systems. No public exploits are reported yet, but the high severity score and the nature of the vulnerability suggest that exploitation could lead to full system compromise. The MongoDB BI Connector is used to enable business intelligence tools to query MongoDB data via ODBC, making it a critical component in data analytics pipelines. The vulnerability thus poses a risk to organizations relying on MongoDB for data warehousing and analytics, especially where the driver is installed on systems accessible by multiple users.
Potential Impact
For European organizations, the impact of CVE-2025-12100 can be severe. Privilege escalation vulnerabilities allow attackers to bypass security controls, potentially gaining administrative access to systems hosting the MongoDB BI Connector ODBC driver. This can lead to unauthorized access to sensitive business intelligence data, manipulation or deletion of critical analytics datasets, and disruption of data-driven decision-making processes. Industries such as finance, healthcare, manufacturing, and government agencies that rely heavily on data analytics are particularly vulnerable. The breach of confidentiality could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity violations could corrupt analytics results, affecting operational decisions. Availability impacts could disrupt business continuity if the driver or associated services are compromised. Given the local attack vector, the threat is heightened in environments where multiple users share access or where attackers have gained initial footholds through other means. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency.
Mitigation Recommendations
1. Immediately audit all systems running MongoDB BI Connector ODBC driver versions 1.0.0 through 1.4.6 to identify installations. 2. Apply patches or upgrade to a fixed version as soon as MongoDB releases an update addressing this vulnerability. 3. Until patches are available, manually review and tighten file system permissions on the driver’s installation directories and configuration files to restrict access to trusted administrators only. 4. Implement strict access controls and user privilege management on systems hosting the driver to minimize the number of users with local access. 5. Monitor system logs and audit trails for unusual privilege escalation attempts or access patterns related to the driver. 6. Employ endpoint detection and response (EDR) tools to detect suspicious activities indicative of exploitation attempts. 7. Educate system administrators and security teams about the vulnerability and the importance of least privilege principles. 8. Consider isolating the BI Connector driver environment or running it within hardened containers or virtual machines to reduce attack surface. 9. Review and update incident response plans to include scenarios involving privilege escalation through this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mongodb
- Date Reserved
- 2025-10-23T00:22:17.477Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68fa99bbff7543f249e1540f
Added to database: 10/23/2025, 9:10:19 PM
Last enriched: 10/23/2025, 9:10:36 PM
Last updated: 10/24/2025, 3:08:03 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Pwn2Own Underscores Secure Development Concerns
HighTired of Unpaid Toll Texts? Blame the 'Smishing Triad'
HighCVE-2024-7885: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
HighCVE-2025-7730: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-60023: CWE-23 in AutomationDirect Productivity Suite
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.